01283cam a2200385I 4500996415981350368120180817102036.0150312s2015 sz 000 0 eng d90762947833191724339783319172439(OCoLC)ocn904811959(OCoLC)904811959(PU)6415981-penndb-Voyager(OCoLC)907629478YDXCPengYDXCPOCLCQCDXPAUPAUUHV6432.L44 2015363.323Lee, Newton.http://share-vde.org/sharevde/rdfBibframe/Agent/4200689http://isni.org/isni/0000000376042074Counterterrorism and cybersecurity 2015.2nd revised edition.Cham :Springer,2015.http://share-vde.org/sharevde/rdfBibframe/Publisher/18556 pages :illustrations ;24 cmtexttxtrdacontenthttp://rdaregistry.info/termList/RDAContentType/1020unmediatednrdamediahttp://rdaregistry.info/termList/RDAMediaType/1007volumencrdacarrierhttp://rdaregistry.info/termList/RDACarrierType/1049TerrorismUnited StatesPrevention.http://id.loc.gov/authorities/subjects/sh2008112795TerrorismUnited StatesPreventionHistory.Computer networksSecurity measures.http://id.loc.gov/authorities/subjects/sh99005295Data mining.http://id.loc.gov/authorities/subjects/sh97002073http://rdaregistry.info/Elements/m/P30004http://worldcat.org/oclc/9048119592245772015-06-0889.9973.79crim1PromptCat YAP92PAUCounterterrorism and cybersecurity 2015http://share-vde.org/sharevde/rdfBibframe/Work/31687022-1UPENNVanPeltLibvanpHV6432.L44 2015YAP 06/08/201522348041590003681223480415900036812334804158000368131198065036126